* Fix: Use correct URL variable for raw HTML extraction (#1116) - Prevents full HTML content from being passed as URL to extraction strategies - Added unit tests to verify raw HTML and regular URL processing Fix: Wrong URL variable used for extraction of raw html * Fix #1181: Preserve whitespace in code blocks during HTML scraping The remove_empty_elements_fast() method was removing whitespace-only span elements inside <pre> and <code> tags, causing import statements like "import torch" to become "importtorch". Now skips elements inside code blocks where whitespace is significant. * Refactor Pydantic model configuration to use ConfigDict for arbitrary types * Fix EmbeddingStrategy: Uncomment response handling for the variations and clean up mock data. ref #1621 * Fix: permission issues with .cache/url_seeder and other runtime cache dirs. ref #1638 * fix: ensure BrowserConfig.to_dict serializes proxy_config * feat: make LLM backoff configurable end-to-end - extend LLMConfig with backoff delay/attempt/factor fields and thread them through LLMExtractionStrategy, LLMContentFilter, table extraction, and Docker API handlers - expose the backoff parameter knobs on perform_completion_with_backoff/aperform_completion_with_backoff and document them in the md_v2 guides * reproduced AttributeError from #1642 * pass timeout parameter to docker client request * added missing deep crawling objects to init * generalized query in ContentRelevanceFilter to be a str or list * import modules from enhanceable deserialization * parameterized tests * Fix: capture current page URL to reflect JavaScript navigation and add test for delayed redirects. ref #1268 * refactor: replace PyPDF2 with pypdf across the codebase. ref #1412 * Add browser_context_id and target_id parameters to BrowserConfig Enable Crawl4AI to connect to pre-created CDP browser contexts, which is essential for cloud browser services that pre-create isolated contexts. Changes: - Add browser_context_id and target_id parameters to BrowserConfig - Update from_kwargs() and to_dict() methods - Modify BrowserManager.start() to use existing context when provided - Add _get_page_by_target_id() helper method - Update get_page() to handle pre-existing targets - Add test for browser_context_id functionality This enables cloud services to: 1. Create isolated CDP contexts before Crawl4AI connects 2. Pass context/target IDs to BrowserConfig 3. Have Crawl4AI reuse existing contexts instead of creating new ones * Add cdp_cleanup_on_close flag to prevent memory leaks in cloud/server scenarios * Fix: add cdp_cleanup_on_close to from_kwargs * Fix: find context by target_id for concurrent CDP connections * Fix: use target_id to find correct page in get_page * Fix: use CDP to find context by browserContextId for concurrent sessions * Revert context matching attempts - Playwright cannot see CDP-created contexts * Add create_isolated_context flag for concurrent CDP crawls When True, forces creation of a new browser context instead of reusing the default context. Essential for concurrent crawls on the same browser to prevent navigation conflicts. * Add context caching to create_isolated_context branch Uses contexts_by_config cache (same as non-CDP mode) to reuse contexts for multiple URLs with same config. Still creates new page per crawl for navigation isolation. Benefits batch/deep crawls. * Add init_scripts support to BrowserConfig for pre-page-load JS injection This adds the ability to inject JavaScript that runs before any page loads, useful for stealth evasions (canvas/audio fingerprinting, userAgentData). - Add init_scripts parameter to BrowserConfig (list of JS strings) - Apply init_scripts in setup_context() via context.add_init_script() - Update from_kwargs() and to_dict() for serialization * Fix CDP connection handling: support WS URLs and proper cleanup Changes to browser_manager.py: 1. _verify_cdp_ready(): Support multiple URL formats - WebSocket URLs (ws://, wss://): Skip HTTP verification, Playwright handles directly - HTTP URLs with query params: Properly parse with urlparse to preserve query string - Fixes issue where naive f"{cdp_url}/json/version" broke WS URLs and query params 2. close(): Proper cleanup when cdp_cleanup_on_close=True - Close all sessions (pages) - Close all contexts - Call browser.close() to disconnect (doesn't terminate browser, just releases connection) - Wait 1 second for CDP connection to fully release - Stop Playwright instance to prevent memory leaks This enables: - Connecting to specific browsers via WS URL - Reusing the same browser with multiple sequential connections - No user wait needed between connections (internal 1s delay handles it) Added tests/browser/test_cdp_cleanup_reuse.py with comprehensive tests. * Update gitignore * Some debugging for caching * Add _generate_screenshot_from_html for raw: and file:// URLs Implements the missing method that was being called but never defined. Now raw: and file:// URLs can generate screenshots by: 1. Loading HTML into a browser page via page.set_content() 2. Taking screenshot using existing take_screenshot() method 3. Cleaning up the page afterward This enables cached HTML to be rendered with screenshots in crawl4ai-cloud. * Add PDF and MHTML support for raw: and file:// URLs - Replace _generate_screenshot_from_html with _generate_media_from_html - New method handles screenshot, PDF, and MHTML in one browser session - Update raw: and file:// URL handlers to use new method - Enables cached HTML to generate all media types * Add crash recovery for deep crawl strategies Add optional resume_state and on_state_change parameters to all deep crawl strategies (BFS, DFS, Best-First) for cloud deployment crash recovery. Features: - resume_state: Pass saved state to resume from checkpoint - on_state_change: Async callback fired after each URL for real-time state persistence to external storage (Redis, DB, etc.) - export_state(): Get last captured state manually - Zero overhead when features are disabled (None defaults) State includes visited URLs, pending queue/stack, depths, and pages_crawled count. All state is JSON-serializable. * Fix: HTTP strategy raw: URL parsing truncates at # character The AsyncHTTPCrawlerStrategy.crawl() method used urlparse() to extract content from raw: URLs. This caused HTML with CSS color codes like #eee to be truncated because # is treated as a URL fragment delimiter. Before: raw:body{background:#eee} -> parsed.path = 'body{background:' After: raw:body{background:#eee} -> raw_content = 'body{background:#eee' Fix: Strip the raw: or raw:// prefix directly instead of using urlparse, matching how the browser strategy handles it. * Add base_url parameter to CrawlerRunConfig for raw HTML processing When processing raw: HTML (e.g., from cache), the URL parameter is meaningless for markdown link resolution. This adds a base_url parameter that can be set explicitly to provide proper URL resolution context. Changes: - Add base_url parameter to CrawlerRunConfig.__init__ - Add base_url to CrawlerRunConfig.from_kwargs - Update aprocess_html to use base_url for markdown generation Usage: config = CrawlerRunConfig(base_url='https://example.com') result = await crawler.arun(url='raw:{html}', config=config) * Add prefetch mode for two-phase deep crawling - Add `prefetch` parameter to CrawlerRunConfig - Add `quick_extract_links()` function for fast link extraction - Add short-circuit in aprocess_html() for prefetch mode - Add 42 tests (unit, integration, regression) 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com> * Updates on proxy rotation and proxy configuration * Add proxy support to HTTP crawler strategy * Add browser pipeline support for raw:/file:// URLs - Add process_in_browser parameter to CrawlerRunConfig - Route raw:/file:// URLs through _crawl_web() when browser operations needed - Use page.set_content() instead of goto() for local content - Fix cookie handling for non-HTTP URLs in browser_manager - Auto-detect browser requirements: js_code, wait_for, screenshot, etc. - Maintain fast path for raw:/file:// without browser params Fixes #310 * Add smart TTL cache for sitemap URL seeder - Add cache_ttl_hours and validate_sitemap_lastmod params to SeedingConfig - New JSON cache format with metadata (version, created_at, lastmod, url_count) - Cache validation by TTL expiry and sitemap lastmod comparison - Auto-migration from old .jsonl to new .json format - Fixes bug where incomplete cache was used indefinitely * Update URL seeder docs with smart TTL cache parameters - Add cache_ttl_hours and validate_sitemap_lastmod to parameter table - Document smart TTL cache validation with examples - Add cache-related troubleshooting entries - Update key features summary * Add MEMORY.md to gitignore * Docs: Add multi-sample schema generation section Add documentation explaining how to pass multiple HTML samples to generate_schema() for stable selectors that work across pages with varying DOM structures. Includes: - Problem explanation (fragile nth-child selectors) - Solution with code example - Key points for multi-sample queries - Comparison table of fragile vs stable selectors * Fix critical RCE and LFI vulnerabilities in Docker API deployment Security fixes for vulnerabilities reported by ProjectDiscovery: 1. Remote Code Execution via Hooks (CVE pending) - Remove __import__ from allowed_builtins in hook_manager.py - Prevents arbitrary module imports (os, subprocess, etc.) - Hooks now disabled by default via CRAWL4AI_HOOKS_ENABLED env var 2. Local File Inclusion via file:// URLs (CVE pending) - Add URL scheme validation to /execute_js, /screenshot, /pdf, /html - Block file://, javascript:, data: and other dangerous schemes - Only allow http://, https://, and raw: (where appropriate) 3. Security hardening - Add CRAWL4AI_HOOKS_ENABLED=false as default (opt-in for hooks) - Add security warning comments in config.yml - Add validate_url_scheme() helper for consistent validation Testing: - Add unit tests (test_security_fixes.py) - 16 tests - Add integration tests (run_security_tests.py) for live server Affected endpoints: - POST /crawl (hooks disabled by default) - POST /crawl/stream (hooks disabled by default) - POST /execute_js (URL validation added) - POST /screenshot (URL validation added) - POST /pdf (URL validation added) - POST /html (URL validation added) Breaking changes: - Hooks require CRAWL4AI_HOOKS_ENABLED=true to function - file:// URLs no longer work on API endpoints (use library directly) * Enhance authentication flow by implementing JWT token retrieval and adding authorization headers to API requests * Add release notes for v0.7.9, detailing breaking changes, security fixes, new features, bug fixes, and documentation updates * Add release notes for v0.8.0, detailing breaking changes, security fixes, new features, bug fixes, and documentation updates Documentation for v0.8.0 release: - SECURITY.md: Security policy and vulnerability reporting guidelines - RELEASE_NOTES_v0.8.0.md: Comprehensive release notes - migration/v0.8.0-upgrade-guide.md: Step-by-step migration guide - security/GHSA-DRAFT-RCE-LFI.md: GitHub security advisory drafts - CHANGELOG.md: Updated with v0.8.0 changes Breaking changes documented: - Docker API hooks disabled by default (CRAWL4AI_HOOKS_ENABLED) - file:// URLs blocked on Docker API endpoints Security fixes credited to Neo by ProjectDiscovery * Add examples for deep crawl crash recovery and prefetch mode in documentation * Release v0.8.0: The v0.8.0 Update - Updated version to 0.8.0 - Added comprehensive demo and release notes - Updated all documentation * Update security researcher acknowledgment with a hyperlink for Neo by ProjectDiscovery * Add async agenerate_schema method for schema generation - Extract prompt building to shared _build_schema_prompt() method - Add agenerate_schema() async version using aperform_completion_with_backoff - Refactor generate_schema() to use shared prompt builder - Fixes Gemini/Vertex AI compatibility in async contexts (FastAPI) * Fix: Enable litellm.drop_params for O-series/GPT-5 model compatibility O-series (o1, o3) and GPT-5 models only support temperature=1. Setting litellm.drop_params=True auto-drops unsupported parameters instead of throwing UnsupportedParamsError. Fixes temperature=0.01 error for these models in LLM extraction. --------- Co-authored-by: rbushria <rbushri@gmail.com> Co-authored-by: AHMET YILMAZ <tawfik@kidocode.com> Co-authored-by: Soham Kukreti <kukretisoham@gmail.com> Co-authored-by: Chris Murphy <chris.murphy@klaviyo.com> Co-authored-by: unclecode <unclecode@kidocode.com> Co-authored-by: Claude Opus 4.5 <noreply@anthropic.com>
558 lines
18 KiB
Python
558 lines
18 KiB
Python
#!/usr/bin/env python3
|
|
"""
|
|
Comprehensive test demonstrating all hook types from hooks_example.py
|
|
adapted for the Docker API with real URLs
|
|
"""
|
|
|
|
import requests
|
|
import json
|
|
import time
|
|
from typing import Dict, Optional
|
|
|
|
API_BASE_URL = "http://localhost:11235"
|
|
|
|
# Global token storage
|
|
_auth_token: Optional[str] = None
|
|
|
|
|
|
def get_auth_token(email: str = "test@gmail.com") -> str:
|
|
"""
|
|
Get a JWT token from the /token endpoint.
|
|
The email domain must have valid MX records.
|
|
"""
|
|
global _auth_token
|
|
|
|
if _auth_token:
|
|
return _auth_token
|
|
|
|
print(f"🔐 Requesting JWT token for {email}...")
|
|
response = requests.post(
|
|
f"{API_BASE_URL}/token",
|
|
json={"email": email}
|
|
)
|
|
|
|
if response.status_code == 200:
|
|
data = response.json()
|
|
_auth_token = data["access_token"]
|
|
print(f"✅ Token obtained successfully")
|
|
return _auth_token
|
|
else:
|
|
raise Exception(f"Failed to get token: {response.status_code} - {response.text}")
|
|
|
|
|
|
def get_auth_headers() -> Dict[str, str]:
|
|
"""Get headers with JWT Bearer token."""
|
|
token = get_auth_token()
|
|
return {
|
|
"Authorization": f"Bearer {token}",
|
|
"Content-Type": "application/json"
|
|
}
|
|
|
|
|
|
def test_all_hooks_demo():
|
|
"""Demonstrate all 8 hook types with practical examples"""
|
|
print("=" * 70)
|
|
print("Testing: All Hooks Comprehensive Demo")
|
|
print("=" * 70)
|
|
|
|
hooks_code = {
|
|
"on_browser_created": """
|
|
async def hook(browser, **kwargs):
|
|
# Hook called after browser is created
|
|
print("[HOOK] on_browser_created - Browser is ready!")
|
|
# Browser-level configurations would go here
|
|
return browser
|
|
""",
|
|
|
|
"on_page_context_created": """
|
|
async def hook(page, context, **kwargs):
|
|
# Hook called after a new page and context are created
|
|
print("[HOOK] on_page_context_created - New page created!")
|
|
|
|
# Set viewport size for consistent rendering
|
|
await page.set_viewport_size({"width": 1920, "height": 1080})
|
|
|
|
# Add cookies for the session (using httpbin.org domain)
|
|
await context.add_cookies([
|
|
{
|
|
"name": "test_session",
|
|
"value": "abc123xyz",
|
|
"domain": ".httpbin.org",
|
|
"path": "/",
|
|
"httpOnly": True,
|
|
"secure": True
|
|
}
|
|
])
|
|
|
|
# Block ads and tracking scripts to speed up crawling
|
|
await context.route("**/*.{png,jpg,jpeg,gif,webp,svg}", lambda route: route.abort())
|
|
await context.route("**/analytics/*", lambda route: route.abort())
|
|
await context.route("**/ads/*", lambda route: route.abort())
|
|
|
|
print("[HOOK] Viewport set, cookies added, and ads blocked")
|
|
return page
|
|
""",
|
|
|
|
"on_user_agent_updated": """
|
|
async def hook(page, context, user_agent, **kwargs):
|
|
# Hook called when user agent is updated
|
|
print(f"[HOOK] on_user_agent_updated - User agent: {user_agent[:50]}...")
|
|
return page
|
|
""",
|
|
|
|
"before_goto": """
|
|
async def hook(page, context, url, **kwargs):
|
|
# Hook called before navigating to each URL
|
|
print(f"[HOOK] before_goto - About to visit: {url}")
|
|
|
|
# Add custom headers for the request
|
|
await page.set_extra_http_headers({
|
|
"X-Custom-Header": "crawl4ai-test",
|
|
"Accept-Language": "en-US,en;q=0.9",
|
|
"DNT": "1"
|
|
})
|
|
|
|
return page
|
|
""",
|
|
|
|
"after_goto": """
|
|
async def hook(page, context, url, response, **kwargs):
|
|
# Hook called after navigating to each URL
|
|
print(f"[HOOK] after_goto - Successfully loaded: {url}")
|
|
|
|
# Wait a moment for dynamic content to load
|
|
await page.wait_for_timeout(1000)
|
|
|
|
# Check if specific elements exist (with error handling)
|
|
try:
|
|
# For httpbin.org, wait for body element
|
|
await page.wait_for_selector("body", timeout=2000)
|
|
print("[HOOK] Body element found and loaded")
|
|
except:
|
|
print("[HOOK] Timeout waiting for body, continuing anyway")
|
|
|
|
return page
|
|
""",
|
|
|
|
"on_execution_started": """
|
|
async def hook(page, context, **kwargs):
|
|
# Hook called after custom JavaScript execution
|
|
print("[HOOK] on_execution_started - Custom JS executed!")
|
|
|
|
# You could inject additional JavaScript here if needed
|
|
await page.evaluate("console.log('[INJECTED] Hook JS running');")
|
|
|
|
return page
|
|
""",
|
|
|
|
"before_retrieve_html": """
|
|
async def hook(page, context, **kwargs):
|
|
# Hook called before retrieving the HTML content
|
|
print("[HOOK] before_retrieve_html - Preparing to get HTML")
|
|
|
|
# Scroll to bottom to trigger lazy loading
|
|
await page.evaluate("window.scrollTo(0, document.body.scrollHeight);")
|
|
await page.wait_for_timeout(500)
|
|
|
|
# Scroll back to top
|
|
await page.evaluate("window.scrollTo(0, 0);")
|
|
await page.wait_for_timeout(500)
|
|
|
|
# One more scroll to middle for good measure
|
|
await page.evaluate("window.scrollTo(0, document.body.scrollHeight / 2);")
|
|
|
|
print("[HOOK] Scrolling completed for lazy-loaded content")
|
|
return page
|
|
""",
|
|
|
|
"before_return_html": """
|
|
async def hook(page, context, html, **kwargs):
|
|
# Hook called before returning the HTML content
|
|
print(f"[HOOK] before_return_html - HTML length: {len(html)} characters")
|
|
|
|
# Log some page metrics
|
|
metrics = await page.evaluate('''() => {
|
|
return {
|
|
images: document.images.length,
|
|
links: document.links.length,
|
|
scripts: document.scripts.length
|
|
}
|
|
}''')
|
|
|
|
print(f"[HOOK] Page metrics - Images: {metrics['images']}, Links: {metrics['links']}, Scripts: {metrics['scripts']}")
|
|
|
|
return page
|
|
"""
|
|
}
|
|
|
|
# Create request payload
|
|
payload = {
|
|
"urls": ["https://httpbin.org/html"],
|
|
"hooks": {
|
|
"code": hooks_code,
|
|
"timeout": 30
|
|
},
|
|
"crawler_config": {
|
|
"js_code": "window.scrollTo(0, document.body.scrollHeight);",
|
|
"wait_for": "body",
|
|
"cache_mode": "bypass"
|
|
}
|
|
}
|
|
|
|
print("\nSending request with all 8 hooks...")
|
|
start_time = time.time()
|
|
|
|
response = requests.post(f"{API_BASE_URL}/crawl", json=payload, headers=get_auth_headers())
|
|
|
|
elapsed_time = time.time() - start_time
|
|
print(f"Request completed in {elapsed_time:.2f} seconds")
|
|
|
|
if response.status_code == 200:
|
|
data = response.json()
|
|
print("\n✅ Request successful!")
|
|
|
|
# Check hooks execution
|
|
if 'hooks' in data:
|
|
hooks_info = data['hooks']
|
|
print("\n📊 Hooks Execution Summary:")
|
|
print(f" Status: {hooks_info['status']['status']}")
|
|
print(f" Attached hooks: {len(hooks_info['status']['attached_hooks'])}")
|
|
|
|
for hook_name in hooks_info['status']['attached_hooks']:
|
|
print(f" ✓ {hook_name}")
|
|
|
|
if 'summary' in hooks_info:
|
|
summary = hooks_info['summary']
|
|
print(f"\n📈 Execution Statistics:")
|
|
print(f" Total executions: {summary['total_executions']}")
|
|
print(f" Successful: {summary['successful']}")
|
|
print(f" Failed: {summary['failed']}")
|
|
print(f" Timed out: {summary['timed_out']}")
|
|
print(f" Success rate: {summary['success_rate']:.1f}%")
|
|
|
|
if hooks_info.get('execution_log'):
|
|
print(f"\n📝 Execution Log:")
|
|
for log_entry in hooks_info['execution_log']:
|
|
status_icon = "✅" if log_entry['status'] == 'success' else "❌"
|
|
exec_time = log_entry.get('execution_time', 0)
|
|
print(f" {status_icon} {log_entry['hook_point']}: {exec_time:.3f}s")
|
|
|
|
# Check crawl results
|
|
if 'results' in data and len(data['results']) > 0:
|
|
print(f"\n📄 Crawl Results:")
|
|
for result in data['results']:
|
|
print(f" URL: {result['url']}")
|
|
print(f" Success: {result.get('success', False)}")
|
|
if result.get('html'):
|
|
print(f" HTML length: {len(result['html'])} characters")
|
|
|
|
else:
|
|
print(f"❌ Error: {response.status_code}")
|
|
try:
|
|
error_data = response.json()
|
|
print(f"Error details: {json.dumps(error_data, indent=2)}")
|
|
except:
|
|
print(f"Error text: {response.text[:500]}")
|
|
|
|
|
|
def test_authentication_flow():
|
|
"""Test a complete authentication flow with multiple hooks"""
|
|
print("\n" + "=" * 70)
|
|
print("Testing: Authentication Flow with Multiple Hooks")
|
|
print("=" * 70)
|
|
|
|
hooks_code = {
|
|
"on_page_context_created": """
|
|
async def hook(page, context, **kwargs):
|
|
print("[HOOK] Setting up authentication context")
|
|
|
|
# Add authentication cookies
|
|
await context.add_cookies([
|
|
{
|
|
"name": "auth_token",
|
|
"value": "fake_jwt_token_here",
|
|
"domain": ".httpbin.org",
|
|
"path": "/",
|
|
"httpOnly": True,
|
|
"secure": True
|
|
}
|
|
])
|
|
|
|
# Set localStorage items (for SPA authentication)
|
|
await page.evaluate('''
|
|
localStorage.setItem('user_id', '12345');
|
|
localStorage.setItem('auth_time', new Date().toISOString());
|
|
''')
|
|
|
|
return page
|
|
""",
|
|
|
|
"before_goto": """
|
|
async def hook(page, context, url, **kwargs):
|
|
print(f"[HOOK] Adding auth headers for {url}")
|
|
|
|
# Add Authorization header
|
|
import base64
|
|
credentials = base64.b64encode(b"user:passwd").decode('ascii')
|
|
|
|
await page.set_extra_http_headers({
|
|
'Authorization': f'Basic {credentials}',
|
|
'X-API-Key': 'test-api-key-123'
|
|
})
|
|
|
|
return page
|
|
"""
|
|
}
|
|
|
|
payload = {
|
|
"urls": [
|
|
"https://httpbin.org/basic-auth/user/passwd"
|
|
],
|
|
"hooks": {
|
|
"code": hooks_code,
|
|
"timeout": 15
|
|
}
|
|
}
|
|
|
|
print("\nTesting authentication with httpbin endpoints...")
|
|
response = requests.post(f"{API_BASE_URL}/crawl", json=payload, headers=get_auth_headers())
|
|
|
|
if response.status_code == 200:
|
|
data = response.json()
|
|
print("✅ Authentication test completed")
|
|
|
|
if 'results' in data:
|
|
for i, result in enumerate(data['results']):
|
|
print(f"\n URL {i+1}: {result['url']}")
|
|
if result.get('success'):
|
|
# Check for authentication success indicators
|
|
html_content = result.get('html', '')
|
|
if '"authenticated"' in html_content and 'true' in html_content:
|
|
print(" ✅ Authentication successful! Basic auth worked.")
|
|
else:
|
|
print(" ⚠️ Page loaded but auth status unclear")
|
|
else:
|
|
print(f" ❌ Failed: {result.get('error_message', 'Unknown error')}")
|
|
else:
|
|
print(f"❌ Error: {response.status_code}")
|
|
|
|
|
|
def test_performance_optimization_hooks():
|
|
"""Test hooks for performance optimization"""
|
|
print("\n" + "=" * 70)
|
|
print("Testing: Performance Optimization Hooks")
|
|
print("=" * 70)
|
|
|
|
hooks_code = {
|
|
"on_page_context_created": """
|
|
async def hook(page, context, **kwargs):
|
|
print("[HOOK] Optimizing page for performance")
|
|
|
|
# Block resource-heavy content
|
|
await context.route("**/*.{png,jpg,jpeg,gif,webp,svg,ico}", lambda route: route.abort())
|
|
await context.route("**/*.{woff,woff2,ttf,otf}", lambda route: route.abort())
|
|
await context.route("**/*.{mp4,webm,ogg,mp3,wav}", lambda route: route.abort())
|
|
await context.route("**/googletagmanager.com/*", lambda route: route.abort())
|
|
await context.route("**/google-analytics.com/*", lambda route: route.abort())
|
|
await context.route("**/doubleclick.net/*", lambda route: route.abort())
|
|
await context.route("**/facebook.com/*", lambda route: route.abort())
|
|
|
|
# Disable animations and transitions
|
|
await page.add_style_tag(content='''
|
|
*, *::before, *::after {
|
|
animation-duration: 0s !important;
|
|
animation-delay: 0s !important;
|
|
transition-duration: 0s !important;
|
|
transition-delay: 0s !important;
|
|
}
|
|
''')
|
|
|
|
print("[HOOK] Performance optimizations applied")
|
|
return page
|
|
""",
|
|
|
|
"before_retrieve_html": """
|
|
async def hook(page, context, **kwargs):
|
|
print("[HOOK] Removing unnecessary elements before extraction")
|
|
|
|
# Remove ads, popups, and other unnecessary elements
|
|
await page.evaluate('''() => {
|
|
// Remove common ad containers
|
|
const adSelectors = [
|
|
'.ad', '.ads', '.advertisement', '[id*="ad-"]', '[class*="ad-"]',
|
|
'.popup', '.modal', '.overlay', '.cookie-banner', '.newsletter-signup'
|
|
];
|
|
|
|
adSelectors.forEach(selector => {
|
|
document.querySelectorAll(selector).forEach(el => el.remove());
|
|
});
|
|
|
|
// Remove script tags to clean up HTML
|
|
document.querySelectorAll('script').forEach(el => el.remove());
|
|
|
|
// Remove style tags we don't need
|
|
document.querySelectorAll('style').forEach(el => el.remove());
|
|
}''')
|
|
|
|
return page
|
|
"""
|
|
}
|
|
|
|
payload = {
|
|
"urls": ["https://httpbin.org/html"],
|
|
"hooks": {
|
|
"code": hooks_code,
|
|
"timeout": 10
|
|
}
|
|
}
|
|
|
|
print("\nTesting performance optimization hooks...")
|
|
start_time = time.time()
|
|
|
|
response = requests.post(f"{API_BASE_URL}/crawl", json=payload, headers=get_auth_headers())
|
|
|
|
elapsed_time = time.time() - start_time
|
|
print(f"Request completed in {elapsed_time:.2f} seconds")
|
|
|
|
if response.status_code == 200:
|
|
data = response.json()
|
|
print("✅ Performance optimization test completed")
|
|
|
|
if 'results' in data and len(data['results']) > 0:
|
|
result = data['results'][0]
|
|
if result.get('html'):
|
|
print(f" HTML size: {len(result['html'])} characters")
|
|
print(" Resources blocked, ads removed, animations disabled")
|
|
else:
|
|
print(f"❌ Error: {response.status_code}")
|
|
|
|
|
|
def test_content_extraction_hooks():
|
|
"""Test hooks for intelligent content extraction"""
|
|
print("\n" + "=" * 70)
|
|
print("Testing: Content Extraction Hooks")
|
|
print("=" * 70)
|
|
|
|
hooks_code = {
|
|
"after_goto": """
|
|
async def hook(page, context, url, response, **kwargs):
|
|
print(f"[HOOK] Waiting for dynamic content on {url}")
|
|
|
|
# Wait for any lazy-loaded content
|
|
await page.wait_for_timeout(2000)
|
|
|
|
# Trigger any "Load More" buttons
|
|
try:
|
|
load_more = await page.query_selector('[class*="load-more"], [class*="show-more"], button:has-text("Load More")')
|
|
if load_more:
|
|
await load_more.click()
|
|
await page.wait_for_timeout(1000)
|
|
print("[HOOK] Clicked 'Load More' button")
|
|
except:
|
|
pass
|
|
|
|
return page
|
|
""",
|
|
|
|
"before_retrieve_html": """
|
|
async def hook(page, context, **kwargs):
|
|
print("[HOOK] Extracting structured data")
|
|
|
|
# Extract metadata
|
|
metadata = await page.evaluate('''() => {
|
|
const getMeta = (name) => {
|
|
const element = document.querySelector(`meta[name="${name}"], meta[property="${name}"]`);
|
|
return element ? element.getAttribute('content') : null;
|
|
};
|
|
|
|
return {
|
|
title: document.title,
|
|
description: getMeta('description') || getMeta('og:description'),
|
|
author: getMeta('author'),
|
|
keywords: getMeta('keywords'),
|
|
ogTitle: getMeta('og:title'),
|
|
ogImage: getMeta('og:image'),
|
|
canonical: document.querySelector('link[rel="canonical"]')?.href,
|
|
jsonLd: Array.from(document.querySelectorAll('script[type="application/ld+json"]'))
|
|
.map(el => el.textContent).filter(Boolean)
|
|
};
|
|
}''')
|
|
|
|
print(f"[HOOK] Extracted metadata: {json.dumps(metadata, indent=2)}")
|
|
|
|
# Infinite scroll handling
|
|
for i in range(3):
|
|
await page.evaluate("window.scrollTo(0, document.body.scrollHeight);")
|
|
await page.wait_for_timeout(1000)
|
|
print(f"[HOOK] Scroll iteration {i+1}/3")
|
|
|
|
return page
|
|
"""
|
|
}
|
|
|
|
payload = {
|
|
"urls": ["https://httpbin.org/html", "https://httpbin.org/json"],
|
|
"hooks": {
|
|
"code": hooks_code,
|
|
"timeout": 20
|
|
}
|
|
}
|
|
|
|
print("\nTesting content extraction hooks...")
|
|
response = requests.post(f"{API_BASE_URL}/crawl", json=payload, headers=get_auth_headers())
|
|
|
|
if response.status_code == 200:
|
|
data = response.json()
|
|
print("✅ Content extraction test completed")
|
|
|
|
if 'hooks' in data and 'summary' in data['hooks']:
|
|
summary = data['hooks']['summary']
|
|
print(f" Hooks executed: {summary['successful']}/{summary['total_executions']}")
|
|
|
|
if 'results' in data:
|
|
for result in data['results']:
|
|
print(f"\n URL: {result['url']}")
|
|
print(f" Success: {result.get('success', False)}")
|
|
else:
|
|
print(f"❌ Error: {response.status_code}")
|
|
|
|
|
|
def main():
|
|
"""Run comprehensive hook tests"""
|
|
print("🔧 Crawl4AI Docker API - Comprehensive Hooks Testing")
|
|
print("Based on docs/examples/hooks_example.py")
|
|
print("=" * 70)
|
|
|
|
# Get JWT token first (required when jwt_enabled=true)
|
|
try:
|
|
get_auth_token()
|
|
print("=" * 70)
|
|
except Exception as e:
|
|
print(f"❌ Failed to authenticate: {e}")
|
|
print("Make sure the server is running and jwt_enabled is configured correctly.")
|
|
return
|
|
|
|
tests = [
|
|
("All Hooks Demo", test_all_hooks_demo),
|
|
("Authentication Flow", test_authentication_flow),
|
|
("Performance Optimization", test_performance_optimization_hooks),
|
|
("Content Extraction", test_content_extraction_hooks),
|
|
]
|
|
|
|
for i, (name, test_func) in enumerate(tests, 1):
|
|
print(f"\n📌 Test {i}/{len(tests)}: {name}")
|
|
try:
|
|
test_func()
|
|
print(f"✅ {name} completed")
|
|
except Exception as e:
|
|
print(f"❌ {name} failed: {e}")
|
|
import traceback
|
|
traceback.print_exc()
|
|
|
|
print("\n" + "=" * 70)
|
|
print("🎉 All comprehensive hook tests completed!")
|
|
print("=" * 70)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
main() |